, SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), version 0.97. www.secg.org, 2013.

L. Atzori, A. Iera, and G. Morabito, The internet of things: A survey, Computer networks, vol.54, issue.15, pp.2787-2805, 2010.

G. De-meulenaer, F. Gosset, O. X. Standaert, and O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing, pp.580-585, 2008.

T. El-maliki and J. M. Seigneur, A survey of user-centric identity management technologies, Emerging Security Information, Systems, and Technologies, pp.12-17, 2007.

M. S. Farash, M. Turkanovi?, S. Kumari, and M. Hölbl, An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment, Ad Hoc Networks, vol.36, pp.152-176, 2016.

P. Gope and T. Hwang, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Transactions on Industrial Electronics, 2016.

H. Khemissa and D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of internet of things, Wireless Telecommunications Symposium (WTS), pp.1-6, 2016.

T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, Dtls based security and two-way authentication for the internet of things, Ad Hoc Networks, vol.11, issue.8, pp.2710-2723, 2013.

H. Krawczyk, R. Canetti, and M. Bellare, Hmac: Keyed-hashing for message authentication, 1997.

J. Lee, K. Kapitanova, and S. H. Son, The price of security in wireless sensor networks, Computer Networks, vol.54, issue.17, pp.2967-2978, 2010.

K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the internet of things, Ad Hoc Networks, vol.32, pp.17-31, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01272046

P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed iot applications, International Journal of Distributed Sensor Networks, 2014.

P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, Two-phase authentication protocol for wireless sensor networks in distributed iot applications, Wireless Communications and Networking Conference (WCNC), pp.2728-2733, 2014.

E. Rescorla and N. Modadugu, Datagram transport layer security version, vol.1, 2012.

M. Safkhani and N. Bagheri, Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things, vol.838, 2016.

S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-porisini, Security, privacy and trust in internet of things: The road ahead, Computer Networks, vol.76, pp.146-164, 2015.

P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks, Wireless sensor networks, pp.305-320, 2008.

A. Tewari and B. Gupta, Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags, The Journal of Supercomputing, pp.1-18, 2016.

M. Turkanovi?, B. Brumen, and M. Hölbl, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Networks, vol.20, pp.96-112, 2014.

A. D. Wood and J. Stankovic, Denial of service in sensor networks, Computer, vol.35, issue.10, pp.54-62, 2002.

K. Xue, C. Ma, P. Hong, and R. Ding, A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Journal of Network and Computer Applications, vol.36, issue.1, pp.316-323, 2013.